咨询与建议

限定检索结果

文献类型

  • 14,413 篇 会议
  • 646 篇 期刊文献
  • 39 篇 学位论文
  • 36 册 图书
  • 1 篇 科技报告

馆藏范围

  • 15,134 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 10,934 篇 工学
    • 10,275 篇 计算机科学与技术...
    • 5,404 篇 软件工程
    • 1,460 篇 信息与通信工程
    • 953 篇 电气工程
    • 875 篇 控制科学与工程
    • 446 篇 生物工程
    • 221 篇 网络空间安全
    • 220 篇 化学工程与技术
    • 186 篇 机械工程
    • 174 篇 生物医学工程(可授...
    • 141 篇 电子科学与技术(可...
    • 100 篇 仪器科学与技术
    • 100 篇 安全科学与工程
  • 2,473 篇 理学
    • 1,150 篇 数学
    • 649 篇 物理学
    • 518 篇 生物学
    • 391 篇 统计学(可授理学、...
    • 241 篇 系统科学
    • 232 篇 化学
  • 2,413 篇 管理学
    • 1,747 篇 图书情报与档案管...
    • 754 篇 管理科学与工程(可...
    • 239 篇 工商管理
    • 104 篇 公共管理
  • 1,761 篇 文学
    • 1,709 篇 外国语言文学
    • 184 篇 中国语言文学
  • 510 篇 医学
    • 299 篇 临床医学
    • 282 篇 基础医学(可授医学...
    • 112 篇 公共卫生与预防医...
  • 277 篇 法学
    • 249 篇 社会学
  • 237 篇 教育学
    • 224 篇 教育学
  • 100 篇 农学
  • 97 篇 经济学
  • 9 篇 艺术学
  • 7 篇 哲学
  • 4 篇 军事学

主题

  • 3,523 篇 natural language...
  • 1,768 篇 natural language...
  • 945 篇 computational li...
  • 736 篇 semantics
  • 676 篇 machine learning
  • 606 篇 deep learning
  • 520 篇 natural language...
  • 346 篇 computational mo...
  • 334 篇 training
  • 333 篇 sentiment analys...
  • 330 篇 accuracy
  • 327 篇 large language m...
  • 322 篇 feature extracti...
  • 311 篇 data mining
  • 290 篇 speech processin...
  • 263 篇 speech recogniti...
  • 250 篇 transformers
  • 235 篇 neural networks
  • 217 篇 iterative method...
  • 211 篇 support vector m...

机构

  • 85 篇 carnegie mellon ...
  • 51 篇 university of ch...
  • 45 篇 carnegie mellon ...
  • 44 篇 tsinghua univers...
  • 42 篇 zhejiang univers...
  • 41 篇 national univers...
  • 37 篇 nanyang technolo...
  • 36 篇 university of wa...
  • 35 篇 univ chinese aca...
  • 34 篇 university of sc...
  • 34 篇 carnegie mellon ...
  • 33 篇 stanford univers...
  • 32 篇 gaoling school o...
  • 32 篇 school of artifi...
  • 32 篇 alibaba grp peop...
  • 29 篇 tsinghua univ de...
  • 28 篇 harbin institute...
  • 28 篇 peking universit...
  • 27 篇 language technol...
  • 26 篇 microsoft resear...

作者

  • 55 篇 zhou guodong
  • 50 篇 neubig graham
  • 46 篇 liu yang
  • 39 篇 sun maosong
  • 36 篇 zhang min
  • 34 篇 liu qun
  • 33 篇 smith noah a.
  • 28 篇 schütze hinrich
  • 28 篇 lapata mirella
  • 27 篇 liu zhiyuan
  • 26 篇 wen ji-rong
  • 24 篇 chang kai-wei
  • 23 篇 zhou jie
  • 23 篇 yang diyi
  • 23 篇 zhao hai
  • 23 篇 zhao wayne xin
  • 21 篇 chua tat-seng
  • 20 篇 dredze mark
  • 18 篇 biemann chris
  • 18 篇 fung pascale

语言

  • 14,541 篇 英文
  • 481 篇 其他
  • 104 篇 中文
  • 18 篇 法文
  • 15 篇 土耳其文
  • 2 篇 西班牙文
  • 2 篇 俄文
检索条件"任意字段=Conference on empirical methods in natural language processing"
15135 条 记 录,以下是4931-4940 订阅
排序:
2nd Workshop on Ethical Artificial Intelligence: methods and Applications (EAI)  23
2nd Workshop on Ethical Artificial Intelligence: Methods and...
收藏 引用
29th ACM SIGKDD conference on Knowledge Discovery and Data Mining (KDD)
作者: Zhao, Chen Chen, Feng Wu, Xintao Chen, Haifeng Zhou, Jiayu Baylor Univ Waco TX 76798 USA Univ Texas Dallas Richardson TX USA Univ Arkansas Fayetteville AR USA NEC Labs Amer Princeton NY USA Michigan State Univ E Lansing MI USA
Ethical AI has become increasingly important, and it has been attracting attention from academia and industry, due to its increased popularity in real-world applications with fairness concerns. It also places fundamen... 详细信息
来源: 评论
A Survey of Event Relation Extraction  11th
A Survey of Event Relation Extraction
收藏 引用
11th International conference on Frontier Computing, FC 2021
作者: Xie, QunLi Pan, JunLan Liu, Tao Qian, BeiBei Wang, XianChuan Wang, Xianchao Fuyang Normal University Anhui Fuyang236037 China
Human beings recognize and understand the real world in units of events. In recent years, events have been used as the basic unit to process unstructured text in the field of natural language processing, but there is ... 详细信息
来源: 评论
Speech Mastery Detection Using Advanced natural language processing (NLP) and Automatic Speech Recognition (ASR) Techniques
Speech Mastery Detection Using Advanced Natural Language Pro...
收藏 引用
Artificial Intelligence and Signal processing (AISP), INDIA, International conference on
作者: Pratikhya Raut Korikana Anitha Sasubilli Sowmya Kongara Vinnu Department of Electronics and Communication Engineering Velagapudi Ramakrishna Siddhartha Engineering College Deemed to be University Andhra Pradesh India
In today's globalized world, English communication skills are essential for career advancement and cross-cultural collaboration, enhancing access to information and opportunities. Automatic speech recognition, or ... 详细信息
来源: 评论
Intelligent Algorithm Design and Program Simulation of Lexical Cohesion Method based on Perceptual Pattern Recognition Algorithm in College English Writing  5
Intelligent Algorithm Design and Program Simulation of Lexic...
收藏 引用
5th International conference on Inventive Computation Technologies (ICICT)
作者: Cai, Yi Jilin Univ Sch Foreign Language Educ Changchun 130000 Jilin Peoples R China
This paper designs an intelligent algorithm in college English writing based on the lexical cohesion method of perceptual pattern recognition algorithm. First, it analyzes the importance of developing an intelligent E... 详细信息
来源: 评论
SACR: Self-training with Saliency-Augmented Consistency Regularization for Few-Shot Learners
SACR: Self-training with Saliency-Augmented Consistency Regu...
收藏 引用
International conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Yanyan Feng Yue Zhou Yun Xue Fenghuan Li Zehong Lin School of Electronics and Information Engineering South China Normal University Foshan China Department of Artiffcial Intelligence School of Informatics Xiamen University Xiamen China School of Computer Science and Technology Guangdong University of Technology Guangzhou China
Pre-trained language models have made significant strides in natural language processing tasks, enabling flexible fine-tuning for downstream applications. However, in few-shot learning scenarios, pre-trained models fa... 详细信息
来源: 评论
Larger language Models Don’t Care How You Think: Why Chain-of-Thought Prompting Fails in Subjective Tasks
Larger Language Models Don’t Care How You Think: Why Chain-...
收藏 引用
International conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Georgios Chochlakis Niyantha Maruthu Pandiyan Kristina Lerman Shrikanth Narayanan CS and ECE - School of Advanced Computing University of Southern California
In-Context Learning (ICL) in Large language Models (LLM) has emerged as the dominant technique for performing natural language tasks, as it does not require updating the model parameters with gradient-based methods. I... 详细信息
来源: 评论
LLMs for Generation of Architectural Components: An Exploratory empirical Study in the Serverless World
LLMs for Generation of Architectural Components: An Explorat...
收藏 引用
Working IEEE/IFIP conference on Software Architecture
作者: Shrikara Arun Meghana Tedla Karthik Vaidhyanathan SERC IIIT Hyderabad India
Recently, the exponential growth in capability and pervasiveness of Large language Models (LLMs) has led to significant work done in the field of code generation. However, this generation has been limited to code snip... 详细信息
来源: 评论
frances: A Deep Learning NLP and Text Mining Web Tool to Unlock Historical Digital Collections  18
frances: A Deep Learning NLP and Text Mining Web Tool to Unl...
收藏 引用
IEEE 18th International conference on E-Science (E-Science)
作者: Filgueira, Rosa Univ St Andrews Sch Comp Sci St Andrews Fife Scotland
This work presents frances, an integrated text mining tool that combines information extraction, knowledge graphs, NLP, deep learning, parallel processing and Semantic Web techniques to unlock the full value of histor... 详细信息
来源: 评论
Design and Implementation of System of the Web Vulnerability Detection Based on Crawler and natural language processing  7
Design and Implementation of System of the Web Vulnerability...
收藏 引用
7th International conference on Information and Network Technologies, ICINT 2022
作者: Ge, Xin Yue, Minnan Information Office University of Shanghai for Science and Technology Shanghai China School of Energy and Power Engineering University of Shanghai for Science and Technology Shanghai China
Application code analysis and static rules are the most common methods for Web vulnerability detection, but this process will generate a large amount of contaminated data and network pressure, the false positive rate ... 详细信息
来源: 评论
Unlocking Personality Insights: Assessing Videos with Deep Learning Techniques  3rd
Unlocking Personality Insights: Assessing Videos with Deep L...
收藏 引用
3rd International conference on Signal and Data processing, ICSDP 2023
作者: Athilakshmi, R. Jansi, R. Dutta, Indira Amulya Pavikars, M.M. Department of Computational Intelligence Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur603203 India Department of Electronics and Communication Engineering Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur603203 India
In contemporary times, monitoring criminal behavior and providing mental health therapy requires various activities related to an individual’s character. The development of an automated process for personality assess... 详细信息
来源: 评论